Virsec Blog
Discover the latest in cybersecurity, current events, and wisdom from our industry experts.
COVID-19 & Outdated Software on 83% of Medical Devices
With plates already over-full, the medical community has more than one concern regarding equipment - medical device security. First they’ve had to ...
Were It Not Illegal, Ransomware Would Be a Perfect Business Model
A business model should be flexible, profitable, and able to adapt to changing conditions, competition and any adverse condition in order to contin...
Enabling Cyber Resilience During COVID-19 Crisis
At Virsec, we understand that cybersecurity remains essential to the state of business, operations, and national security. Even during this pandemi...
Defending Against The New Reality Of Fileless Malware Attacks
Forbes, May 4, 2020, with comments from Satya Gupta
Organizations know that antivirus software is outmatched in protecting against today’s malware ...
New Technique Lets Hackers Use Vulnerability to Disable AV Software
IT security researchers are always hunting to find vulnerabilities and exposures before hackers do. They’ve found one recently where a certain tech...
Zoom's biggest challenge isn't just fixing its security blunders
Business Insider, April 11, 2020, with comments by Satya Gupta
“Zooming” has become its own verb that everyone now immediately associates with a co...
Maze Ransomware Group Continues Attacks on Oil & CyberInsurance Giants
They’ve shown they’ll strike any industry, now even cyberinsurance - a field all others depend on for help when they’ve been breached.
Maze contin...
As Pandemic-Related Traps Spawn Cyberattacks, How Ready Are You?
As COVID-19 crisis progresses, Cybersecurity remains essential to the state of business operations. Many of the largest enterprises are greatly aff...
Public Entities Are Under (Cyber)Attack
PropertyCasualty360, March 25, 2020, with comments by Willy Leichter;
As cyberattack risks are set to increase sharply in the coming months and yea...
Silicon Valley Cybersecurity Companies Helping Prevent Online Attacks
As people continue to store their personal information on laptops and mobile devices, the world faces the mounting threat of identity theft. In rec...
Subscribe to Blog
Get timely insight about server workload protection, runtime visibility, and defend against attacks – known and unknown.
Newsletter
Categories
- Blog (237)
- Security News (126)
- SolarWinds (8)
- Cybersecurity (7)
- RCE Attack (3)
- Remote Code Execution (3)
- EPP/EDR (2)
- Microsoft (2)
- Ransomware (2)
- SolarWinds Attack (2)
- Zero Trust (2)
- Acer Ransomware Attack (1)
- Cloud Security (1)
- Container Protection (1)
- Cyber Attack (1)
- Cyber Resilience (1)
- Exchange (1)
- MS Exchange Attack (1)
- National Vulnerability Database (1)
- Patching (1)
- Virsec Security Research Lab (1)